1 Answer
- Newest
- Most votes
- Most comments
3
Hi Pedro, You will need to update the bucket policy to grant access to your third-party application. As you pointed out, AWS Control Tower Guardrail prevents updates to bucket policies, so you will need to log into the Organization Management account first, then use the Switch Role capability from the drop down menu under your login in the upper right, to assume the AWSControlTowerExecution role in the Logging account. Using that role, you will be able to update the bucket policy in the Logging account. If you prefer doing this in code, you can also accomplish this using the AssumeRole cli command.
answered 3 years ago
Relevant content
- asked 2 years ago
- asked 2 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 9 days ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 10 months ago
Were you able to figure this out? I just tried this using the documentation at https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-policy-generation.html?icmpid=docs_iam_console#access-analyzer-policy-generation-cross-account with no luck.